Objectives. Collage of Trojan Horse surrounded by viruses, computer with keyboard, user name and password prompt and suspicious-looking hacker.